audit: type=1804 audit(1677979513.790:155): pid=13839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir4247155733/syzkaller.grOdCE/66/bus" dev="sda1" ino=14346 res=1 general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 3553 Comm: kworker/u4:5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 Workqueue: writeback wb_workfn (flush-7:3) RIP: 0010:lbmStartIO+0x12b/0x480 fs/jfs/jfs_logmgr.c:2143 Code: c1 ea 03 80 3c 02 00 0f 85 f5 02 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6c 24 20 49 8d bd e0 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ef 02 00 00 4d 8b ad e0 00 00 00 4d 39 ee 74 67 RSP: 0018:ffff8880a8f17740 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff888091a33c00 RCX: 0000000000000003 RDX: 000000000000001c RSI: ffffffff835f37ea RDI: 00000000000000e0 RBP: ffff8880a8c98340 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880b25e8040 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 FS: 0000000000000000(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f795c26a1b0 CR3: 0000000097b67000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 00000000b8fecd19 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lbmWrite+0x27b/0x3a0 fs/jfs/jfs_logmgr.c:2092 lmGCwrite+0x3f2/0x4e0 fs/jfs/jfs_logmgr.c:806 jfs_flush_journal.part.0+0x478/0x6a0 fs/jfs/jfs_logmgr.c:1570 jfs_flush_journal+0x23/0x30 fs/jfs/jfs_logmgr.c:1537 jfs_write_inode+0x175/0x1d0 fs/jfs/inode.c:140 write_inode fs/fs-writeback.c:1244 [inline] __writeback_single_inode+0x733/0x11d0 fs/fs-writeback.c:1442 writeback_sb_inodes+0x537/0xef0 fs/fs-writeback.c:1647 wb_writeback+0x28d/0xcc0 fs/fs-writeback.c:1820 wb_do_writeback fs/fs-writeback.c:1965 [inline] wb_workfn+0x29b/0x1250 fs/fs-writeback.c:2006 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Modules linked in: ---[ end trace 44f46c6f45a18e07 ]--- RIP: 0010:lbmStartIO+0x12b/0x480 fs/jfs/jfs_logmgr.c:2143 Code: c1 ea 03 80 3c 02 00 0f 85 f5 02 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6c 24 20 49 8d bd e0 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ef 02 00 00 4d 8b ad e0 00 00 00 4d 39 ee 74 67 RSP: 0018:ffff8880a8f17740 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff888091a33c00 RCX: 0000000000000003 hub 9-0:1.0: USB hub found hub 9-0:1.0: 8 ports detected RDX: 000000000000001c RSI: ffffffff835f37ea RDI: 00000000000000e0 RBP: ffff8880a8c98340 R08: 0000000000000001 R09: 0000000000000000 xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880b25e8040 ipt_CLUSTERIP: Please specify destination IP R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fff5d9d8d07 CR3: 00000000a09ae000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 00000000b8fecd19 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: c1 ea 03 shr $0x3,%edx 3: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 7: 0f 85 f5 02 00 00 jne 0x302 d: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 14: fc ff df 17: 4d 8b 6c 24 20 mov 0x20(%r12),%r13 1c: 49 8d bd e0 00 00 00 lea 0xe0(%r13),%rdi 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 ef 02 00 00 jne 0x323 34: 4d 8b ad e0 00 00 00 mov 0xe0(%r13),%r13 3b: 4d 39 ee cmp %r13,%r14 3e: 74 67 je 0xa7